Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








241 Hits in 7.9 sec

Target localization in Wireless Sensor Networks using error correcting codes in the presence of Byzantines

Aditya Vempaty, Yunghsiang S. Han, Pramod K. Varshney
2013 2013 IEEE International Conference on Acoustics, Speech and Signal Processing  
We consider the problem of target localization using quantized data in Wireless Sensor Networks in the presence of Byzantines (malicious sensors).  ...  Since the effect of Byzantines can be treated as errors in the transmitted data, we propose the use of error correcting codes for the task of target localization.  ...  TARGET LOCALIZATION USING ERROR CORRECTING CODES In this section, we propose Localization using Error Correcting Codes which is tolerant to Byzantine attacks.  ... 
doi:10.1109/icassp.2013.6638653 dblp:conf/icassp/VempatyHV13 fatcat:f2c7kzx2hjd45oofu5hmmt5uwa

Target Localization in Wireless Sensor Networks Using Error Correcting Codes

Aditya Vempaty, Yunghsiang S. Han, Pramod K. Varshney
2014 IEEE Transactions on Information Theory  
In this work, we consider the task of target localization using quantized data in Wireless Sensor Networks (WSNs).  ...  The coding based iterative approach works well even in the presence of Byzantine (malicious) sensors in the network. We further consider the effect of non-ideal channels.  ...  In this paper, we considered the problem of target localization in wireless sensor networks.  ... 
doi:10.1109/tit.2013.2289859 fatcat:4adbyhqsonhkddcp7katx4raii

Secured Routing in Mobile Ad hoc Networks (MANETs)

S. Maharaja, R. Jeyalakshmi, A.V. Sabarish Kanna, M. Deva Priya
2019 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
Various attacks are prevalent in MANET, out of which Byzantine attack plays a vital role.  ...  A node or group of nodes present in the routing path between the source and the destination may be compromised due to Byzantine attack.  ...  The attacker is considered to be strategic in nature and a fusion rule with local sensor thresholds that minimizes the probability of error at the FC is designed.  ... 
doi:10.32628/cseit195275 fatcat:24jkoix77rgdhbeckkon3x4txi

Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks

Aditya Vempaty, Lang Tong, Pramod K. Varshney
2013 IEEE Signal Processing Magazine  
In particular, we discuss target localization in a wireless sensor network, where sensors send quantized data to the FC [26] .  ...  Vempaty et al. in [27] analyze the effect of Byzantines on target localization.  ...  design for networks robust to Byzantines, and fundamental characterizations of communication rate in the presence of Byzantines in the general case ■ ■ development of network-wide capability to detect  ... 
doi:10.1109/msp.2013.2262116 fatcat:njsqlam5enfh7h73uibptxd6r4

Byzantine fault-tolerant routing for large-scale wireless sensor networks based on fast ECDSA

Jiawei Xu, Keda Wang, Chao Wang, Feng Hu, Zhenhua Zhang, Shiyi Xu, Jie Wu
2015 Tsinghua Science and Technology  
Wireless sensor networks are a favorite target of Byzantine malicious attackers because of their limited energy, low calculation capability, and dynamic topology, and other important characteristics.  ...  to 1.2 times, we propose a new Byzantine fault-tolerant routing algorithm for large-scale wireless sensor networks with double-level hierarchical architecture.  ...  (No. 14ZZ089), Shanghai Key Laboratory of Specialty Fiber Optics and Optical Access Networks (No.  ... 
doi:10.1109/tst.2015.7350015 fatcat:6ysezir7iffdnetywgqn2zdchy

An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks [article]

Jaydip Sen
2010 arXiv   pre-print
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications.  ...  This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield.  ...  Beyond mere detection of the presence of a network, detection of its structure, topology and other communication pattern among the nodes can invite more directed attacks, e.g., targeted attack on the base  ... 
arXiv:1012.2516v1 fatcat:z3jly4jjirf7jfsvp4reqaeebi

A Survey on Security and Privacy Protocols for Cognitive Wireless Sensor Networks [article]

Jaydip Sen
2013 arXiv   pre-print
However, this issue becomes even more critical in cognitive wireless sensor networks, a type of WSN in which the sensor nodes have the capabilities of changing their transmission and reception parameters  ...  Since in many WSN applications, lives and livelihoods may depend on the timeliness and correctness of sensor data obtained from dispersed sensor nodes, these networks must be secured to prevent any possible  ...  Acknowledgement The author gratefully acknowledges the contributions in this work received from his students Swati Choudhury, Swetashree Mishra, Isha Bharati, Ramesh Kumar, Aiswaraya Mohapatra and Prateek  ... 
arXiv:1308.0682v1 fatcat:zkwd6kpgkjaojhxkupzpggo67e

An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks [article]

Jaydip Sen, Sripad Krishna
2012 arXiv   pre-print
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications.  ...  This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield.  ...  Beyond mere detection of the presence of a network, detection of its structure, topology and other communication pattern among the nodes can invite more directed attacks, e.g., targeted attack on the base  ... 
arXiv:1111.0380v2 fatcat:xwtbvyz5erdnhpdaqcdmkwczu4

Table of Contents [EDICS]

2020 IEEE Transactions on Signal Processing  
Yang 6142 Joint Features Extraction for Multiple Moving Targets Using (Ultra-)Wideband FMCW Signals in the Presence of Doppler Ambiguity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Guo 6187 Minimum Byzantine Effort for Blinding Distributed Detection in Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Xiong 2912 Prospect Theory Based Crowdsourcing for Classification in the Presence of Spammers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/tsp.2020.3045363 fatcat:wcnvdcy3rvhblh7rtxfe6gz4re

Vulnerabilities in cognitive radio networks: A survey

Shameek Bhattacharjee, Shamik Sengupta, Mainak Chatterjee
2013 Computer Communications  
Cognitive radio networks are envisioned to drive the next generation wireless networks that can dynamically optimize spectrum use.  ...  In this survey, we put forward the security concerns and the vulnerabilities that threaten to plague the deployment of cognitive radio networks.  ...  Detection of puea using sensor networks A method to detect the PUEA using an underlying wireless sensor network has been proposed in [15] .  ... 
doi:10.1016/j.comcom.2013.06.003 fatcat:mqpdzfk67fcv7glayx7vkrdnau

Towards Choosing Authentication and Encryption: Communication Security in Sensor Networks

Seongwook Youn, Hyun-chong Cho
2017 Journal of Electrical Engineering and Technology  
Security is one of main issues in wireless sensor networks because of potential adversaries.  ...  This paper provides the different security models as a metric, which can then be used to make pertinent security decisions for securing wireless sensor network communication.  ...  Acknowledgements This study was supported by Korea National University of Transportation in 2016 and 2016 Research Grant from Kangwon National University.  ... 
doi:10.5370/jeet.2017.12.3.1307 fatcat:xjsvruq6una77c3f2fsbmd5o5u

Over-the-Air Computation: Foundations, Technologies, and Applications [article]

Zhibin Wang, Yapeng Zhao, Yong Zhou, Yuanming Shi, Chunxiao Jiang, Khaled B. Letaief
2022 arXiv   pre-print
The mathematical form and communication design are introduced as the foundations of AirComp, and the critical issues of AirComp over different network architectures are then discussed along with the review  ...  Moreover, we present the existing studies that tackle the practical implementation issues in AirComp systems, and elaborate the applications of AirComp in Internet of Things and edge intelligent networks  ...  from multiple noisy observations in wireless sensor networks.  ... 
arXiv:2210.10524v1 fatcat:ge26qpdceff4zhbd7fjecaikma

2013 Annual Index

2014 IEEE Transactions on Mobile Computing  
-that appeared in this periodical during 2013, and items from previous years that were commented upon or corrected in 2013.  ...  The Author Index contains the primary entry for each item, listed under the rst author's name.  ...  ., +, TMC June 2013 1225-1235 Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks.  ... 
doi:10.1109/tmc.2014.1 fatcat:auiwkgw5hraghc33kunuaddexq

Table of Contents

2020 IEEE Transactions on Signal Processing  
Bar-Shalom 3371 AOA Pseudolinear Target Motion Analysis in the Presence of Sensor Location Errors .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Sanei 3146 Global Synchronization of Pulse-Coupled Oscillator Networks Under Byzantine Attacks .. . . . . . . . Z. Wang and Y.  ... 
doi:10.1109/tsp.2020.3042287 fatcat:nh7viihaozhd7li3txtadnx5ui

Securing Multi-Path Routing Using Trust Management in Heterogeneous Wsn

B. Sathiyaprasad, C.L.Stefi Sterlin
2014 IOSR Journal of Computer Engineering  
In this paper we propose a hierarchical dynamic trust management protocol for cluster-based wireless sensor networks.  ...  Furthermore, a voting-based IDS algorithm is applied to detect malicious nodes in a heterogeneous wireless sensor network to analyze redundancy level in term of both source and path redundancy.  ...  In Wireless Sensor Network mainly it focuses on energy consumption by using clustered sensor nodes.  ... 
doi:10.9790/0661-16241118 fatcat:z5ah3wiv7fgmbjppbolckq5bly
« Previous Showing results 1 — 15 out of 241 results